- Pingbrief
- Posts
- 🚨 Two New Linux Flaws Let Attackers Gain Full Root Access — Are You Already Exposed?
🚨 Two New Linux Flaws Let Attackers Gain Full Root Access — Are You Already Exposed?

Linux might be known for its rock-solid security—but even the strongest walls can have cracks.
Security researchers have just revealed two critical vulnerabilities—CVE-2025-6018 and CVE-2025-6019—that, when chained together, could allow any regular user to gain full root access on many major Linux distributions. Yes, you read that right: full control, zero admin credentials required.
Here’s the kicker: these aren’t obscure bugs buried deep in fringe packages. These vulnerabilities affect udisks (shipped by default in most desktop distros) and PAM (Pluggable Authentication Modules) configurations in SUSE Linux environments. Together, they create the perfect storm.
🔓 The Root of the Problem
Let’s break this down.
🔹 CVE-2025-6019 affects libblockdev and udisks, tools commonly used to manage storage devices. The flaw allows regular users to run commands with elevated privileges through a graphical interface—or even remotely through SSH, with a bit of creativity.
🔹 CVE-2025-6018, on the other hand, targets SUSE’s PAM configurations. It allows for improper authentication handling, opening the door to privilege escalation.
On their own, they’re dangerous. But chained together? They create a backdoor that any local attacker could walk right through—and right into root.
Security firm Qualys, which discovered the bugs, confirmed that proof-of-concept (PoC) exploits worked on Ubuntu, Fedora, Debian, and openSUSE—a pretty broad swath of the Linux ecosystem.
⚠️ What You Should Do Immediately
If you’re running Linux—especially on desktops or multi-user environments—this is your wake-up call.
✅ Patch now. Vendors are rolling out updates. If yours hasn’t yet, check back daily.
âś… Update Polkit policies. As a temporary fix, require administrative authentication for all local actions.
✅ Review your PAM and udisks usage. Don’t assume defaults are safe—they aren’t.
đź§ But Why Does This Matter?
Because it’s not just about root access—it’s about trust. These flaws show that even widely used, open-source components we’ve relied on for years can still hide dangerous surprises.
It’s also a reminder: security hygiene isn’t optional—even on systems you think are safe by default.
Read Every Newsletter on Pingbrief 🚀
Interested in partnering with us and connecting with an audience of 10,000+ subscribers excited and curious about Tech & Business?
Feel free to reach out to us: [email protected]